Kesar Tech

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Monday, 27 February 2012

Pink Facebook App.

Posted on 21:05 by Unknown
The following is a link to an article about the latest scam going around Facebook. A message comes across Facebook offering to change the color of your page. But, it's a scam just trying to get access to your information.

http://nakedsecurity.sophos.com/2012/02/27/pink-facebook-survey-scam/?utm_source=facebook&utm_medium=status+message&utm_campaign=naked+security
Read More
Posted in Facebook | No comments

Wednesday, 1 February 2012

What is Malware & how do I avoid it?

Posted on 15:59 by Unknown
Recently, I've had a few people ask me what the difference between Malware & a virus is. I thought that maybe someone out there way have the same question, so here is my answer:


  • MALWARE VS. VIRUS: The first thing you need to know is that malware is a generic term used to describe any malicious program. If it's unwanted and insidious, it's malware. Even though they're often confused, malware is not the same as a virus, though a virus is a common form of malware. Viruses are pieces of unwanted code that latch on to legitimate programs and can self-replicate. They're often unwittingly spread though email attachments, USB thumb drives, and file sharing.

  • WORMS: Like a virus, a worm self-replicates, but it doesn't need to attach itself to a host file. Worms burrow into your network looking for vulnerabilities to exploit and spread to other systems.

  • TROJAN: Like the horse of Greek mythology, a trojan masquerades as something awesome—a psychedelic screensaver or card game, for instance—but hides a terrible surprise. In other words, it appears to be something that it's not. Trojans can't replicate themselves like a virus, but once you run or install a trojan, it gets to work opening back doors or whatever evil deed the author intended it to do.

  • SPYWARE: Just what it sounds like, spyware is any unwanted program designed to spy on your activities. It might be a program that logs your keystrokes (keylogger) or tracking software that gather information about you without your knowledge or consent.

  • ADWARE: To keep it short and simple, adware bombards you with ads. Some examples include random pop-ups, unwanted banner ads, and browser redirects.

Now that you know the difference between the different things that can take over your computer, here is how you avoid getting them in the first place.

The best protection against malware isn’t security software, it’s you, the user. You should consider antivirus software as your last line of defense, and if you really want to avoid malware—you should steer clear of high-risk situations altogether. Here are some tips:

  • Above all else, keep your software up to date. It starts with Windows but extends to all of your system software, especially programs that connect to the Internet. If you have a lot of programs installed, Secunia PSI (free, bit.ly/DW9u) will sift through them and let you know which ones are out of date. It will even fetch updates for you.

  • Be extra cautious when connecting to open Wi-Fi networks like the ones you find at coffee shops, airports, and other public places. It doesn’t take much effort for a hacker to set up a fake free Wi-Fi hotspot in hopes that you’ll connect to his laptop instead of the real hotspot.

  • Whenever possible, try to avoid using someone else’s computer to check your webmail. Can you really trust that their system isn’t infected with a keylogger or a screen‑capture utility? It just isn’t worth the risk. If you simply must, don’t forget to log out.

  • Finally, check the file extension before you open what you think is a JPEG or some other picture format. We’ve seen dirty executables hide behind picture icons. Right-click and select Properties, or configure Windows to “Show hidden files, folders, and drives” by opening a folder and going to Tools > Folder Options > View.
Well, there it is, the tools you need to begin your fight for a clean and trouble free PC. Keep your questions and comments coming and see you soon.
Read More
Posted in Informative | No comments
Newer Posts Older Posts Home
Subscribe to: Comments (Atom)

Popular Posts

  • I need your help.
    Hello and thanks for tuning in for another episode of the Kesar Tech blog. Today I would like to go in a little bit of a different directi...
  • 10 Reasons to Root Your Android Device
    Hello & Happy New Year. For those of you with Android devices, here is a way to take control of your device. It's called "Rooti...
  • Belarc Advisor
    This entry is to explain what the Belarc Advisor link on this page is for. Belarc's products automatically create an accurate and up-to-...
  • How do you get infected with malware?
    The answer to the above question is: Social engineering! Several people have asked me this very question, so to you guys, here is your answe...
  • Welcome
    Let me first start by saying, I am by no means an expert at writing, so you will probably find many grammatical errors and maybe even a spel...
  • Extortionware / Rogue Security Software / Malware
    You may not be familiar with the terms ‘rogue software, extortionware, or malware’ but there’s a very good chance that you or someone you kn...
  • Cell phone privacy reminder
    Cell phone numbers became public in March, and telemarketing companies can now call you on your cell. If you do not want to receive these ca...
  • Banking Scam
    Hello Everyone, I received the following scam email in my junk email account today. Many thing alerted me that this was false. * I have a Ch...
  • Free Download F-Secure Anti-Theft for Mobile 6.2
    Are you worried about your mobile phone being stolen and all your info (contacts, account info, etc..) being used for evil? Have no fear F-S...
  • Beware of Christmas scams
    Scammers absolutely love the holiday season. There are likely to be more online scam victims during those busy shopping and travelling Decem...

Categories

  • Facebook
  • Informative
  • Other
  • Security

Blog Archive

  • ►  2014 (1)
    • ►  January (1)
  • ►  2013 (14)
    • ►  December (6)
    • ►  November (3)
    • ►  October (1)
    • ►  September (1)
    • ►  August (1)
    • ►  June (1)
    • ►  April (1)
  • ▼  2012 (20)
    • ►  November (3)
    • ►  October (1)
    • ►  September (1)
    • ►  August (3)
    • ►  July (1)
    • ►  May (3)
    • ►  April (3)
    • ►  March (2)
    • ▼  February (2)
      • Pink Facebook App.
      • What is Malware & how do I avoid it?
    • ►  January (1)
  • ►  2011 (48)
    • ►  December (3)
    • ►  November (4)
    • ►  October (2)
    • ►  September (2)
    • ►  August (4)
    • ►  July (1)
    • ►  June (8)
    • ►  May (3)
    • ►  April (6)
    • ►  March (9)
    • ►  February (3)
    • ►  January (3)
  • ►  2010 (32)
    • ►  December (5)
    • ►  November (2)
    • ►  October (2)
    • ►  September (2)
    • ►  August (2)
    • ►  July (1)
    • ►  June (2)
    • ►  May (2)
    • ►  April (3)
    • ►  March (2)
    • ►  February (4)
    • ►  January (5)
Powered by Blogger.

About Me

Unknown
View my complete profile